Sciweavers

SIGSOFT
2009
ACM
14 years 5 months ago
Fitting the pieces together: a machine-checked model of safe composition
Programs of a software product line can be synthesized by composing features which implement a unit of program functionality. In most product lines, only some combination of featu...
Benjamin Delaware, William R. Cook, Don S. Batory
SIGSOFT
2009
ACM
14 years 5 months ago
Reo2MC: a tool chain for performance analysis of coordination models
In this paper, we present Reo2MC, a tool chain for the performance evaluation of coordination models. Given a coordination model represented by a stochastic Reo connector, Reo2MC ...
Farhad Arbab, Sun Meng, Young-Joo Moon, Marta Z. K...
ICSE
2008
IEEE-ACM
14 years 5 months ago
A verification system for timed interval calculus
Timed Interval Calculus (TIC) is a highly expressive set-based notation for specifying and reasoning about embedded real-time systems. However, it lacks mechanical proving support...
Chunqing Chen, Jin Song Dong, Jun Sun 0001
ICSE
2008
IEEE-ACM
14 years 5 months ago
Systematically refactoring inheritance to delegation in java
Because of the strong coupling of classes and the proliferation of unneeded class members induced by inheritance, the suggestion to use composition and delegation instead has beco...
Hannes Kegel, Friedrich Steimann
ICSE
2008
IEEE-ACM
14 years 5 months ago
SpyWare: a change-aware development toolset
Our research is driven by the motivation that change must be put in the center, if one wants to understand the complex processes of software evolution. We built a toolset named Sp...
Romain Robbes, Michele Lanza
ICSE
2008
IEEE-ACM
14 years 5 months ago
Sufficient mutation operators for measuring test effectiveness
Mutants are automatically-generated, possibly faulty variants of programs. The mutation adequacy ratio of a test suite is the ratio of non-equivalent mutants it is able to identif...
Akbar Siami Namin, James H. Andrews, Duncan J. Mur...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Clone detection in automotive model-based development
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from m...
Benjamin Hummel, Bernhard Schätz, Elmar J&uum...
ICSE
2008
IEEE-ACM
14 years 5 months ago
Best practices in extreme programming course design
Teaching (and therefore learning) eXtreme Programming (XP) in a university setting is difficult because of course time limitations and the soft nature of XP that requires first-ha...
Kai Stapel, Daniel Lübke, Eric Knauss
ICSE
2008
IEEE-ACM
14 years 5 months ago
Tool support for data validation by end-user programmers
End-user programming tools for creating spreadsheets and webforms offer no data types except "string" for storing many kinds of data, such as person names and street add...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
ICSE
2008
IEEE-ACM
14 years 5 months ago
Recommending adaptive changes for framework evolution
Barthélémy Dagenais, Martin P. Robil...